US11496471B2 - Mobile enrollment using a known biometric - Google Patents

Mobile enrollment using a known biometric Download PDF

Info

Publication number
US11496471B2
US11496471B2 US17/224,765 US202117224765A US11496471B2 US 11496471 B2 US11496471 B2 US 11496471B2 US 202117224765 A US202117224765 A US 202117224765A US 11496471 B2 US11496471 B2 US 11496471B2
Authority
US
United States
Prior art keywords
biometric
person
digital representation
identification
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US17/224,765
Other versions
US20210226948A1 (en
Inventor
Stewart Whitman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secure Identity LLC
Original Assignee
Alclear LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alclear LLC filed Critical Alclear LLC
Priority to US17/224,765 priority Critical patent/US11496471B2/en
Publication of US20210226948A1 publication Critical patent/US20210226948A1/en
Priority to US17/977,524 priority patent/US11716330B2/en
Application granted granted Critical
Publication of US11496471B2 publication Critical patent/US11496471B2/en
Priority to US18/209,433 priority patent/US11997087B2/en
Assigned to SECURE IDENTITY, LLC reassignment SECURE IDENTITY, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCLEAR, LLC
Priority to US18/643,874 priority patent/US20240275781A1/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules

Definitions

  • the described embodiments relate generally to biometric identification. More particularly, the present embodiments relate to mobile biometric identification system enrollment using a known biometric.
  • Biometrics such as one or more fingerprints, vein scans, palm-vein scans, voiceprints, facial images, retina images, iris images, deoxyribonucleic acid sequences, heart rhythms, gaits, and so on
  • Biometrics may be used to unlock electronic devices, retrieve sensitive information, enter secure areas (such as airport terminals, event venues, and so on), rent or purchase goods and/or services, and so on.
  • a variety of different technologies may be used in a variety of different implementations to establish a person's identity using biometrics.
  • the fidelity of a biometric refers to the degree of certainty that a particular received biometric matches biometric data that a person previously provided.
  • the degree of certainty that a particular received biometric matches biometric data that a person previously provided does not necessarily mean that an identity for that person has been established.
  • the degree to which the identity has been established relates to the degree to which the identity associated with that previously provided biometric data has been verified. If the person who provided the biometric data is not who he asserts himself to be, a high fidelity for a match would indicate that the person is the same but not that he is who he asserts himself to be.
  • the present disclosure relates to mobile biometric identification system enrollment using a known biometric.
  • the system receives a digital representation of a first biometric for a person.
  • the system compares a received digital representation of a second biometric for the person to known biometric data for the person.
  • the system is operative to identify the person using the digital representation of the first biometric.
  • a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; obtain an image of an identification token for the person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, verify the digital representation of the first biometric by matching a digital representation of a second biometric for the person to data derived from the image of the identification token; and identify the person using the digital representation of the first biometric after verification.
  • liveness detection is performed during capture of the digital representation of the first biometric.
  • the identification token is at least one of a state identification card, a driver's license, a military identification card, or a passport.
  • the identification token includes at least a picture of at least a portion of the person.
  • the biometric data is derived from the picture of the at least the portion of the person.
  • the digital representation of the first biometric and the digital representation of the second biometric are received from different electronic devices. In a number of examples, the digital representation of the first biometric and the digital representation of the second biometric are received a same electronic device.
  • a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to known biometric data for the person; and identify the person using the digital representation of the first biometric after verification.
  • the first biometric is at least one fingerprint and the second biometric is at least a portion of a face. In some examples, the first biometric is at least a portion of a face and the second biometric is at least one fingerprint. In a number of examples, the digital representation of the first biometric is received from an electronic device controlled by the person. In various examples, the first biometric is of a first modality and the second biometric is of a second modality. In a number of examples, the first biometric and the second biometric are of a same modality. In some examples, the at least one processing unit prompts for the digital representation of the second biometric.
  • a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person matches a digital representation of the known biometric; and identify the person using the digital representation of the first biometric after verification.
  • the at least one processing unit receives an indication that the digital representation of the second biometric matches the digital representation of the known biometric. In various implementations of such examples, the indication is an authorization token. In a number of examples, the at least one processing unit cannot access the digital representation of the second biometric. In various examples, the at least one processing unit verifies the digital representation of the first biometric when identifying the person using the digital representation of the first biometric. In some examples, the at least one processing unit disables identification for the person upon unsuccessfully attempting to authenticate the digital representation of the first biometric.
  • FIG. 1 depicts a first example system for mobile biometric identification enrollment.
  • FIG. 2A depicts a first portion of an example implementation of the system of FIG. 1 .
  • FIG. 2B depicts a second portion of the example implementation of the system of FIG. 1 shown in FIG. 2A .
  • FIG. 3 depicts a flow chart illustrating a first example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1 .
  • FIG. 4 depicts a flow chart illustrating a second example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1 .
  • FIG. 5 depicts a flow chart illustrating a third example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1 .
  • FIG. 6 depicts a flow chart illustrating a fourth example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1 .
  • FIG. 7 depicts a flow chart illustrating a fifth example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1 .
  • Identification systems may be dependent on the validity of the enrollment information and/or the authenticity of the identity associated with the enrollment information. If invalid biographic information is provided at enrollment or if biographic information is provided that is not associated with the person who provides the digital representation of the biometric and/or the identity associated with the biographic information is not authentic, misidentification may occur. Identification performed by such an identification system may not be highly accurate.
  • a person could provide biographic information for another person (such as by providing a forged driver's license) while allowing a picture of himself or herself to be captured.
  • a person could provide information from his or her own driver's license while holding up an image of another person to be captured. Identification of the person using the captured picture in either case may be inaccurate.
  • a person may enroll in an identification system at a facility controlled by an entity that operates the identification system or one of its agents.
  • the entity or its agents may be able to inspect presented identification, perform background checks, monitor how biometrics are captured, and so on in order to validate and/or authenticate the identity of the person who is enrolled.
  • this may be burdensome on both the person enrolled and the entity or its agents.
  • Such a burden may be partially or fully mitigated if a person could enroll mobile from the entity or its agents (such as using the person's own cell phone, tablet, laptop, and/or other mobile or non-mobile electronic device) while still allowing the entity or its agents to validate and/or authenticate the identity of the enrolled person.
  • the following disclosure relates to mobile biometric identification system enrollment using a known biometric.
  • the system receives a digital representation of a first biometric for a person.
  • the system compares a received digital representation of a second biometric for the person to known biometric data for the person.
  • the system is operative to identify the person using the digital representation of the first biometric.
  • identification systems and/or the electronic devices used in such identification systems may be capable of performing enrollment, identity validation and/or identification and/or authentication, and other functions that they were not previously capable of performing.
  • the identification systems may be thus able to operate more efficiently and consume fewer resources, resulting in improved operation of the identification systems and/or the electronic devices used in and/or with such identification systems.
  • FIG. 1 depicts a first example system 100 for mobile biometric identification system enrollment using a known biometric.
  • the system 100 may include one or more identity system devices 101 and/or electronic devices 102 that may communicate with each other via one or more wired and/or wireless communication networks 103 .
  • the system 100 may perform mobile biometric identification system enrollment using a known biometric.
  • a person may use a smart phone or other personal electronic device to take an image of one or more of the person's fingerprints.
  • the image or a hash or other digital representation thereof may be used to enroll the person.
  • the image Prior to use of the image to identify the person, the image may be verified by comparing one or more images of the person's face, iris, retina, and so on to a known picture of the person (such as one obtained from an identity token like a driver's license, state identification card, military identification card, passport, and so on).
  • the person may enroll remotely with the fingerprint image and then be prompted to allow the person's facial image to be recorded for verification when the person first attempts to be identified (such as at an airport security screening station, when attempting to access a financial account via the smart phone, at a ticketing station at an event venue, and so on).
  • a person may use a smart phone to access an enrollment application for which the person has generated a password-protected account.
  • the person may have configured the application to allow access using a fingerprint sensor feature provided by the smart phone that provides an authentication token associated with the password in response to the person providing a fingerprint matching one stored by the phone.
  • the person may use the application to capture an image of the person's face or portion thereof and the fingerprint sensor feature to authenticate the facial image.
  • the identity system device 101 may obtain a digital representation of a first biometric for a person from the electronic device 102 ; enroll the person in a biometric identification system using the digital representation of the first biometric (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person (received from the electronic device 102 and/or from a different electronic device 102 ) matches a digital representation of a known biometric.
  • the identity system device 101 may be operative to identify the person using the digital representation of the first biometric (received from the electronic device 102 and/or from a different electronic device 102 ) after verification.
  • the first and second biometrics may be of different modalities (or different types of biometrics, such as a fingerprint being a first modality and a facial or iris or retina being a second modality). However, in other implementations, the first and second biometrics may be of the same modality (such as fingerprints from different fingers, images of different portions of the person's face, and so on).
  • the identity system device 101 may obtain a digital representation of a first biometric for a person from the electronic device 102 ; enroll the person in a biometric identification system using the digital representation of the first biometric (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and upon an initial attempt to identify the person using the first biometric (received from the electronic device 102 and/or from a different electronic device 102 ), authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person (received from the electronic device 102 and/or from a different electronic device 102 ) to known biometric data for the person.
  • the identity system device 101 may identify the person using the digital representation of the first biometric (received from the electronic device 102 and/or from a different electronic device 102 ) after verification.
  • the identity system device 101 may obtain a digital representation of at least one fingerprint for a person from the electronic device 102 ; obtain an image of an identification token for the person from the electronic device 102 ; enroll the person in a biometric identification system using the digital representation of the at least one fingerprint (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and upon an initial attempt to identify the person using the digital representation of the at least one fingerprint, authenticate the digital representation of the at least one fingerprint by matching a digital representation of at least a portion of a facial image for the person (received from the electronic device 102 and/or from a different electronic device 102 ) to data derived from the image of the identification token.
  • the identity system device 101 may identify the person using the digital representation of the at least one fingerprint (received from the electronic device 102 and/or from a different electronic device 102 ) after verification.
  • the identity system device 101 may store and/or track a variety of different information related to the identities of various people. This identity information may include, but is not limited to, one or more names, addresses, telephone numbers, notification preferences and/or other notification information, social security numbers, frequent flyer numbers, financial data, financial account numbers, verified ages, boarding pass data, flight data, movement data, historic movement data, and so on.
  • the identity system device 101 may control access to the identity information as part of responding to requests and/or providing one or more attestations.
  • the identity system device 101 may control access to the identity information using various mechanisms such as through matching of a received hash and/or other digital representation of a biometric with biometric data associated with the identity information, determining that a requestor is authorized to access identity data, receipt of authorized account logins and/or passwords, authorization tokens, and/or other access control mechanisms, and so on.
  • the identity system device 101 may be operative to identify people, authenticate that people have a valid identity token (such as a driver's license, state identification card, military identification card, passport, and so on), authenticate that people have a valid boarding pass and/or other flight or ticket, authorize people to enter an area (such as a security screening checkpoint), and so on.
  • liveness detection may be performed during capture of one or more biometrics.
  • one or more cameras may be used to monitor biometric capture.
  • movement tracking may be performed to ensure that biometrics from a living person are being captured.
  • facial recognition biometrics that do not use monitoring for verification may instead use various image and/or video processing techniques that evaluate eye movement or other features or characteristics in the images used for facial recognition during capture, such as by flashing various colored lights and/or sequences of such and evaluating iris dilation responses to the lights as compared to predicted iris dilation responses.
  • an identification token is scanned and/or otherwise imaged or captured (such as using optical character recognition of text to obtain biographic information)
  • various techniques may be used to authenticate the identification token. For example, white light to authenticate that a piece of identification and/or other identification token is genuine.
  • the electronic device 102 may be any kind of electronic device. Examples of such devices include, but are not limited to, one or more desktop computing devices, laptop computing devices, mobile computing devices, wearable devices, tablet computing devices, mobile telephones, smart phones, printers, displays, kiosks, vehicles, kitchen appliances, entertainment system devices, digital media players, and so on.
  • the electronic device 102 may include one or more processors 107 and/or other processing units and/or controllers, one or more non-transitory storage media 111 (which may take the form of, but is not limited to, a magnetic storage medium; optical storage medium; magneto-optical storage medium; read only memory; random access memory; erasable programmable memory; flash memory; and so on), one or more input and/or output devices (such as one or more keyboards, computer mice, touch screens, touch pads, track pads, microphones, speakers, displays, buttons, dials, switches, printers, and so on), one or more communication units 110 , one or more biometric reader devices 108 (such as a fingerprint scanner, a vein scanner, a palm-vein scanner, an optical fingerprint scanner, a phosphorescent fingerprint scanner, a still image and/or video camera, a 2D and/or 3D image sensor, a capacitive sensor, a saliva sensor, a deoxyribonucleic acid sensor, a heart rhythm monitor, a microphone, and
  • the processor 107 may execute one or more sets of instructions stored in the non-transitory storage media 111 to perform various functions, such as using the biometric reader device 108 to obtain one or more digital representations of one or more biometrics (such as one or more hashes and/or other digital representations of one or more fingerprints, vein scans, palm-vein scans, voiceprints, facial images, retina images, iris images, deoxyribonucleic acid sequences, heart rhythms, gaits, and so on) for a person, communicate with the identity system device 101 via the network 103 using the communication unit 110 , providing one or more obtained digital representations of biometrics, and so on.
  • biometrics such as one or more hashes and/or other digital representations of one or more fingerprints, vein scans, palm-vein scans, voiceprints, facial images, retina images, iris images, deoxyribonucleic acid sequences, heart rhythms, gaits, and so on
  • the identity system device 101 may be any kind of electronic device and/or cloud and/or other computing arrangement and may include one more processors 104 , non-transitory storage media 105 , communication units 106 , and/or other components.
  • the processor 104 may execute one or more sets of instructions stored in the non-transitory storage medium 105 to perform various functions, such as storing biometric data for people and associated identity information (such as one or more names, addresses, telephone numbers, financial data, financial account numbers, verified ages, insurance identifiers, payment account identifiers, and so on), receive one or more digital representations of biometrics, match one or more received digital representations of biometrics to stored biometric data, retrieve identity information associated with stored biometric data matching one or more received digital representations of biometrics, provide retrieved identity information, communicate with the electronic device 102 via the network 103 using the communication unit 106 , and so on.
  • biometric data for people and associated identity information such as one or more names, addresses, telephone numbers, financial data, financial account numbers, verified
  • system 100 is illustrated and described as including particular components arranged in a particular configuration that perform particular functions, it is understood that this is an example. In various implementations, various arrangements of various components that perform various functions may be implemented without departing from the scope of the present disclosure.
  • the system 100 is illustrated as including one electronic device 102 . However, it is understood that this is an example.
  • the system may include multiple electronic devices 102 .
  • a person may use a first electronic device 102 (such as a personal smart phone, laptop computing device, desktop computing device, digital media player, kiosk or other station, wearable device, and so on) to enroll and then get identified and/or have one or more previously provided biometrics verified by a second electronic device 102 (such as a security screening station, a ticketing station, a kiosk or other station, and so on).
  • a first electronic device 102 such as a personal smart phone, laptop computing device, desktop computing device, digital media player, kiosk or other station, wearable device, and so on
  • a second electronic device 102 such as a security screening station, a ticketing station, a kiosk or other station, and so on.
  • FIG. 2A depicts a first portion of an example implementation of the system 100 of FIG. 1 .
  • a person 220 may use a smart phone 202 A to enroll by capturing one or more images of one or more of the person's fingerprints using a camera 208 A of the smart phone 202 A. After enrolling, the person 220 may then go to a place and attempt to provide the fingerprint to identify himself.
  • FIG. 2B depicts a second portion of the example implementation of the system 100 of FIG. 1 shown in FIG. 2A .
  • the person 220 may attempt to enter a security screening gate 202 B at an airport by providing the fingerprint via a fingerprint scanner 208 B.
  • the fingerprint may not yet be verified.
  • a camera 208 C may capture (whether automatically and/or in response to prompting the person 220 ) an image of the person's face to compare to a known image of the person's face (such as one captured from the person's driver's license or other identity token scanned during enrollment). If there is a match, the person's fingerprint may be verified and may then be used for identification.
  • a known image of the person's face such as one captured from the person's driver's license or other identity token scanned during enrollment.
  • FIG. 3 depicts a flow chart illustrating a first example method 300 for mobile biometric identification system enrollment using a known biometric. This method 300 may be performed by the system 100 of FIG. 1 .
  • an electronic device may obtain a digital representation of a first biometric.
  • the electronic device may obtain a digital representation of a second biometric.
  • the electronic device may compare the digital representation of the second biometric to known biometric data (such as a scan of picture of person or a portion thereof from an identification token like a driver's license).
  • the electronic device may determine if there is a match. If not, the flow may proceed to operation 350 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 360 where the electronic device may authenticate the first biometric by authorizing the first biometric for use in identification.
  • the digital representation of the first biometric may be a fingerprint and the digital representation of the second biometric may be a portion of a facial image.
  • the digital representation of the first biometric may be a portion of a facial image and the digital representation of the second biometric may be a fingerprint.
  • the first and second biometrics may be of the same modality. In other examples, the first and second biometrics may be of different modalities.
  • the digital representation of the first biometric and the digital representation of the second biometric may be received from different devices (such as a tablet computing device and a ticketing station).
  • the digital representation of the first biometric and the digital representation of the second biometric may be received from the same device (such as a laptop computing device that is used to enroll in a biometric identification service using the first biometric and then authenticate the first biometric using the second biometric).
  • a person may use an app on a smart phone or other mobile device to capture images of one or more of the person's fingerprints and at least a portion of the person's face using a camera or other 2D or 3D image sensor or 3D scanner.
  • the person may already have an account with a biometric identification service associated with the app and may previously have provided the fingerprint while monitored by an authorized agent.
  • the facial image or digital representation thereof may be verified by matching the fingerprint image or digital representation thereof to the previously verified fingerprint data. The verified facial image or digital representation thereof may then be associated with the person's account with the biometric identification service.
  • the person may have previously verified a facial image and the fingerprint image or digital representation thereof may be verified by matching the facial image or digital representation thereof to the previously verified facial data.
  • the fingerprint image or digital representation thereof may be verified by matching the facial image or digital representation thereof to the previously verified facial data.
  • a person may use an app on a smart phone or other mobile device to capture images of one or more of the person's fingerprints, at least a portion of the person's face, and an identification token such as a driver's license using a camera or other 2D or 3D image sensor or 3D scanner.
  • the app may capture the facial image and the fingerprint image to ensure that the images come from the same person (such as by monitoring capture of both, by taking both at the same time, and so on).
  • the fingerprint image may be verified by matching the facial image or digital representation thereof to an image of at least a portion of the person obtained from the identification token.
  • the app may then enroll the person in a biometric identification service using the fingerprint image or digital representation thereof and/or the facial image or digital representation thereof and/or the image of the identification token or digital representation thereof.
  • a biometric identification service using the fingerprint image or digital representation thereof and/or the facial image or digital representation thereof and/or the image of the identification token or digital representation thereof.
  • an identification token may include a data storage and/or other encoding mechanism that is operative to store biometric data for a person alternatively and/or additionally to including a picture of at least a portion of the person, such as an identification token that includes a picture of at least a portion of a person and a data storage component storing a digital version of the picture.
  • an identification token may include a smart chip, non-transitory storage medium, and so on that may store and/or encode known biometric data for a person associated with the identification token.
  • the identification token may also include one or more mechanisms for retrieving the stored and/or encoded known biometric data (such as magnetically, optically via one or more bar codes or similar mechanisms, radio frequency identification or other near field or other wireless communication, one or more communication contacts and so on.
  • the known biometric data may be retrieved from where it is stored and/or encoded by the identification token and compared to verify one or more obtained digital representations of one or more biometrics.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • this example method 300 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1 .
  • example method 300 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
  • the method 300 is illustrated and described as both obtaining the first and second biometrics and authorizing the first biometric for use in identification. However, it is understood that this is an example. In various implementations, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • FIG. 4 depicts a flow chart illustrating a second example method 400 for mobile biometric identification system enrollment using a known biometric. This method 400 may be performed by the system 100 of FIG. 1 .
  • an electronic device may obtain a digital representation of a first biometric.
  • the electronic device may scan an identification token or obtain such a scan or other image. Scanning the identification token may include capturing a picture on the identification token, obtaining biographic information from the identification token, authenticating that the identification token is valid, and so on.
  • the electronic device may use the digital representation of the first biometric and/or the scan to enroll in a biometric identification system.
  • the electronic device may determine whether or not an identification is requested using the identification system. For example, a person may provide a biometric at a security screening station. If not, the flow returns to operation 404 where the electronic device again determines whether or not an identification is requested. Otherwise, the flow may proceed to operation 405 where the electronic device may determine whether or not the digital representation of the first biometric is verified or authenticated.
  • the digital representation of the first biometric may not be verified if this is the first time that the person has attempted identification. If the digital representation of the first biometric is verified, the flow may proceed to operation 406 where the electronic device may perform an identification using the digital representation of the first biometric. Otherwise, the flow may proceed to operation 407 where the electronic device may obtain a digital representation of a second biometric.
  • the flow may then proceed to operation 408 where the electronic device may determine whether or not the digital representation of the second biometric matches the scan of the identification token. If not, the flow may proceed to operation 410 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 409 where the electronic device may authenticate or verify the digital representation of the first biometric before proceeding to operation 406 and performing an identification using the digital representation of the first biometric.
  • this example method 400 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1 .
  • example method 400 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
  • the method 400 is illustrated and described as both enrolling in the biometric identification system and using the biometric identification system to identify. However, it is understood that this is an example. In various implementations, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • FIG. 5 depicts a flow chart illustrating a third example method 500 for mobile biometric identification system enrollment using a known biometric. This method 500 may be performed by the system 100 of FIG. 1 .
  • an electronic device may obtain a digital representation of one or more fingerprints.
  • the electronic device may scan an identification token.
  • the electronic device may use the digital representation of the fingerprint and/or the scan to enroll in a biometric identification system.
  • the electronic device may determine whether or not an identification using the digital representation of the fingerprint is requested. If not, the flow returns to operation 540 where the electronic device again determines whether or not an identification using the digital representation of the fingerprint is requested. Otherwise, the flow may proceed to operation 550 where the electronic device may determine whether or not the digital representation of the fingerprint is verified or authenticated.
  • the flow may proceed to operation 580 where the electronic device may perform an identification using the digital representation of the fingerprint. Otherwise, the flow may proceed to operation 560 where the electronic device may determine whether or not a digital representation of at least a portion of a facial image matches a portion of a picture from the identification token. If not, the flow may proceed to operation 590 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 570 where the electronic device may authenticate or verify the digital representation of the fingerprint before proceeding to operation 580 and performing an identification using the digital representation of the fingerprint.
  • this example method 500 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1 .
  • example method 500 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
  • the method 500 is illustrated and described as matching a facial image to a known facial image to authenticate a fingerprint. However, it is understood that this is an example. In other examples, a fingerprint may be compared to a known fingerprint in order to authenticate a facial image. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • FIG. 6 depicts a flow chart illustrating a fourth example method 600 for mobile biometric identification system enrollment using a known biometric. This method 600 may be performed by the system 100 of FIG. 1 .
  • a system may allow a person to choose to enroll fingerprints in a biometric identification system.
  • the system may provide instructions for enrolling the fingerprints.
  • the system may allow the person to position the person's hand for capture of one or more images of the fingerprints.
  • the system may capture one or more images of the fingerprints (such as a white light color picture of the fingers that may be converted into Wavelet Scalar Quantization or “WSQ” compatible images).
  • the system may confirm capture of the image of the fingerprints.
  • the system may submit the image and/or a hash or other digital representation thereof.
  • the system may process enrollment to a biometrics service of the biometric identification system using the image.
  • the system may use the image for identification.
  • the system may determine whether or not the user is identified. If not, the flow may proceed to operation 610 where the process ends. Otherwise, the flow may proceed to operation 611 where the system determines whether or not this is the first time the image has been used for identification.
  • the flow may proceed to operation 612 where the system may allow access. Otherwise, the flow may proceed to operation 613 where the system may prompt the person to look at a camera or other 2D and/or 3D image sensor for facial verification.
  • the system may determine whether or not the facial image captured as part of the facial verification matches a stored facial image. If so, the flow may proceed to operation 612 where the system may allow access. Otherwise, the flow may proceed to operation 615 where the system may send a false identification alert and suspend and/or lock the person's account in the biometric identification system before the flow proceeds to operation 610 and ends.
  • this example method 600 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1 .
  • example method 600 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
  • the method 600 includes operations related to providing instruction for biometric capture, enrolling, and identification. However, it is understood that this is an example. In other examples, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • the method 600 is illustrated and described as authenticating the fingerprints using facial recognition the first time that the fingerprints are used.
  • fingerprint or other biometric capture may either be monitored (such as by an authorized agent of the biometric identification system) or submitted remotely.
  • the fingerprints or other biometrics may be flagged as monitored or unmonitored during capture. Monitored captures may not be verified using facial or other biometric recognition upon first use whereas unmonitored captures may be.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • the method 600 is illustrated and described as authenticating biometrics of a fingerprint modality using biometrics of a facial modality.
  • biometrics of one or more different modalities other than fingerprints may be verified using biometrics of one or more modalities other than facial images.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • the method 600 is illustrated and described as using facial images to authenticate fingerprints upon first identification.
  • the person may provide fingerprints for enrollment and then identify using facial recognition.
  • the person may be verified and may then use either facial recognition or fingerprints for identification without any further verification.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • the method 600 is illustrated and described as authenticating the fingerprints using facial recognition only the first time the fingerprints are used.
  • the fingerprints may be verified various numbers of times.
  • different entities may authenticate the fingerprints and some may be more reliable than others. When a more reliable entity performs the verification, verification may be performed fewer times than when a less reliable entity performs the verification.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • FIG. 7 depicts a flow chart illustrating a fifth example method 700 for mobile biometric identification system enrollment using a known biometric. This method 700 may be performed by the system 100 of FIG. 1 .
  • an electronic device may obtain a digital representation of a first biometric using one or more apps or applications.
  • the electronic device may receive an authorization and/or other token indicating that a digital representation of a second biometric was provided that corresponds to an account for the app.
  • the electronic device may use the digital representation of the first biometric for identification.
  • this example method 700 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1 .
  • example method 700 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
  • operation 730 is illustrated and described as using the electronic device using the digital representation of the first biometric for identification. However, it is understood that this is an example.
  • the electronic device may perform operation 730 by enrolling a person who provided the digital representation of the first biometric in a biometric identification system using the digital representation of the first biometric.
  • Various configurations are possible and contemplated without departing from the scope of the present disclosure.
  • a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit may execute the instructions to obtain a digital representation of at least one fingerprint for a person; obtain an image of an identification token for the person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to data derived from the image of the identification token; and identify the person using the digital representation of the first biometric after verification.
  • liveness detection may be performed during capture of the digital representation of the first biometric.
  • the identification token may be at least one of a state identification card, a driver's license, a military identification card, or a passport.
  • the identification token may include at least a picture of at least a portion of the person.
  • the biometric data may be derived from the picture of the at least the portion of the person.
  • the digital representation of the first biometric and the digital representation of the second biometric may be received from different electronic devices.
  • the digital representation of the first biometric and the digital representation of the second biometric may be received by a same electronic device.
  • a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit may execute the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to known biometric data for the person; and identify the person using the digital representation of the first biometric after verification.
  • the first biometric may be at least one fingerprint and the second biometric may be at least a portion of a face. In some examples, the first biometric may be at least a portion of a face and the second biometric may be at least one fingerprint.
  • the digital representation of the first biometric may be received from an electronic device controlled by the person. In various examples, the first biometric may be of a first modality and the second biometric may be of a second modality. In a number of examples, the first biometric and the second biometric may be of a same modality. In some examples, the at least one processing unit may prompt for the digital representation of the second biometric.
  • a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit.
  • the at least one processing unit may execute the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person matches a digital representation of the known biometric; and identify the person using the digital representation of the first biometric after verification.
  • the at least one processing unit may receive an indication that the digital representation of the second biometric matches the digital representation of the known biometric. In various of such examples, the indication may be an authorization token. In a number of examples, the at least one processing unit may not be able to access the digital representation of the second biometric. In various examples, the at least one processing unit may authenticate the digital representation of the first biometric when identifying the person using the digital representation of the first biometric. In some examples, the at least one processing unit may disable identification for the person upon unsuccessfully attempting to authenticate the digital representation of the first biometric.
  • the present disclosure relates to mobile biometric identification system enrollment using a known biometric.
  • the system receives a digital representation of a first biometric for a person.
  • the system compares a received digital representation of a second biometric for the person to known biometric data for the person.
  • the system is operative to identify the person using the digital representation of the first biometric.
  • biometric and/or other personal data is owned by the person from whom such biometric and/or other personal data is derived. This data can be used to the benefit of those people.
  • biometric data may be used to conveniently and reliably identify and/or authenticate the identity of people, access securely stored financial and/or other information associated with the biometric data, and so on. This may allow people to avoid repeatedly providing physical identification and/or other information.
  • biometric and/or other personal data should comply with well-established privacy policies and/or privacy practices. Particularly, such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining security and privately maintaining biometric and/or other personal data, including the use of encryption and security methods that meets or exceeds industry or government standards. For example, biometric and/or other personal data should be collected for legitimate and reasonable uses and not shared or sold outside of those legitimate uses. Further, such collection should occur only after receiving the informed consent.
  • such entities should take any needed steps for safeguarding and securing access to such biometric and/or other personal data and ensuring that others with access to the biometric and/or other personal data adhere to the same privacy policies and practices. Further, such entities should certify their adherence to widely accepted privacy policies and practices by subjecting themselves to appropriate third party evaluation.
  • biometric and/or other personal data may block the use of, storage of, and/or access to biometric and/or other personal data. Entities who typically collect, analyze, store, and/or otherwise use such biometric and/or other personal data should implement and consistently prevent any collection, analysis, storage, and/or other use of any biometric and/or other personal data blocked by the person from whom such biometric and/or other personal data is derived.
  • the methods disclosed may be implemented as sets of instructions or software readable by a device. Further, it is understood that the specific order or hierarchy of steps in the methods disclosed are examples of sample approaches. In other embodiments, the specific order or hierarchy of steps in the method can be rearranged while remaining within the disclosed subject matter.
  • the accompanying method claims present elements of the various steps in a sample order, and are not necessarily meant to be limited to the specific order or hierarchy presented.
  • the described disclosure may be provided as a computer program product, or software, that may include a non-transitory machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure.
  • a non-transitory machine-readable medium includes any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer).
  • the non-transitory machine-readable medium may take the form of, but is not limited to, a magnetic storage medium (e.g., floppy diskette, video cassette, and so on); optical storage medium (e.g., CD-ROM); magneto-optical storage medium; read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; and so on.
  • a magnetic storage medium e.g., floppy diskette, video cassette, and so on
  • optical storage medium e.g., CD-ROM
  • magneto-optical storage medium e.g., magneto-optical storage medium
  • ROM read only memory
  • RAM random access memory
  • EPROM and EEPROM erasable programmable memory
  • flash memory and so on.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

Description

CROSS-REFERENCE TO RELATED APPLICATION(S)
This application is a continuation patent application of U.S. patent application Ser. No. 17/153,415, filed Jan. 20, 2021 and titled “Mobile Enrollment Using a Known Biometric,” which is a continuation patent application of U.S. patent application Ser. No. 16/729,958, filed Dec. 30, 2019 and titled “Mobile Enrollment Using a Known Biometric,” which is a continuation patent application of U.S. patent application Ser. No. 16/374,576, filed Apr. 3, 2019 and titled “Mobile Enrollment Using a Known Biometric,” now U.S. Pat. No. 10,523,671, the disclosures of which are hereby incorporated herein by reference in their entireties.
FIELD
The described embodiments relate generally to biometric identification. More particularly, the present embodiments relate to mobile biometric identification system enrollment using a known biometric.
BACKGROUND
Use of biometrics (such as one or more fingerprints, vein scans, palm-vein scans, voiceprints, facial images, retina images, iris images, deoxyribonucleic acid sequences, heart rhythms, gaits, and so on) to establish a person's identity is increasingly common. Biometrics may be used to unlock electronic devices, retrieve sensitive information, enter secure areas (such as airport terminals, event venues, and so on), rent or purchase goods and/or services, and so on. A variety of different technologies may be used in a variety of different implementations to establish a person's identity using biometrics.
The fidelity of a biometric refers to the degree of certainty that a particular received biometric matches biometric data that a person previously provided. However, the degree of certainty that a particular received biometric matches biometric data that a person previously provided does not necessarily mean that an identity for that person has been established. The degree to which the identity has been established relates to the degree to which the identity associated with that previously provided biometric data has been verified. If the person who provided the biometric data is not who he asserts himself to be, a high fidelity for a match would indicate that the person is the same but not that he is who he asserts himself to be.
SUMMARY
The present disclosure relates to mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.
In various embodiments, a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; obtain an image of an identification token for the person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, verify the digital representation of the first biometric by matching a digital representation of a second biometric for the person to data derived from the image of the identification token; and identify the person using the digital representation of the first biometric after verification.
In some examples, liveness detection is performed during capture of the digital representation of the first biometric. In various examples, the identification token is at least one of a state identification card, a driver's license, a military identification card, or a passport. In a number of examples, the identification token includes at least a picture of at least a portion of the person. In some implementations of such examples, the biometric data is derived from the picture of the at least the portion of the person. In various examples, the digital representation of the first biometric and the digital representation of the second biometric are received from different electronic devices. In a number of examples, the digital representation of the first biometric and the digital representation of the second biometric are received a same electronic device.
In some embodiments, a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to known biometric data for the person; and identify the person using the digital representation of the first biometric after verification.
In various examples, the first biometric is at least one fingerprint and the second biometric is at least a portion of a face. In some examples, the first biometric is at least a portion of a face and the second biometric is at least one fingerprint. In a number of examples, the digital representation of the first biometric is received from an electronic device controlled by the person. In various examples, the first biometric is of a first modality and the second biometric is of a second modality. In a number of examples, the first biometric and the second biometric are of a same modality. In some examples, the at least one processing unit prompts for the digital representation of the second biometric.
In a number of embodiments, a system for mobile biometric identification enrollment includes at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit executes the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person matches a digital representation of the known biometric; and identify the person using the digital representation of the first biometric after verification.
In some examples, the at least one processing unit receives an indication that the digital representation of the second biometric matches the digital representation of the known biometric. In various implementations of such examples, the indication is an authorization token. In a number of examples, the at least one processing unit cannot access the digital representation of the second biometric. In various examples, the at least one processing unit verifies the digital representation of the first biometric when identifying the person using the digital representation of the first biometric. In some examples, the at least one processing unit disables identification for the person upon unsuccessfully attempting to authenticate the digital representation of the first biometric.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements.
FIG. 1 depicts a first example system for mobile biometric identification enrollment.
FIG. 2A depicts a first portion of an example implementation of the system of FIG. 1.
FIG. 2B depicts a second portion of the example implementation of the system of FIG. 1 shown in FIG. 2A.
FIG. 3 depicts a flow chart illustrating a first example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1.
FIG. 4 depicts a flow chart illustrating a second example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1.
FIG. 5 depicts a flow chart illustrating a third example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1.
FIG. 6 depicts a flow chart illustrating a fourth example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1.
FIG. 7 depicts a flow chart illustrating a fifth example method for mobile biometric identification system enrollment using a known biometric. This method may be performed by the system of FIG. 1.
DETAILED DESCRIPTION
Reference will now be made in detail to representative embodiments illustrated in the accompanying drawings. It should be understood that the following descriptions are not intended to limit the embodiments to one preferred embodiment. To the contrary, it is intended to cover alternatives, modifications, and equivalents as can be included within the spirit and scope of the described embodiments as defined by the appended claims.
The description that follows includes sample systems, methods, and computer program products that embody various elements of the present disclosure. However, it should be understood that the described disclosure may be practiced in a variety of forms in addition to those described herein.
Identification systems may be dependent on the validity of the enrollment information and/or the authenticity of the identity associated with the enrollment information. If invalid biographic information is provided at enrollment or if biographic information is provided that is not associated with the person who provides the digital representation of the biometric and/or the identity associated with the biographic information is not authentic, misidentification may occur. Identification performed by such an identification system may not be highly accurate.
For example, a person could provide biographic information for another person (such as by providing a forged driver's license) while allowing a picture of himself or herself to be captured. By way of another example, a person could provide information from his or her own driver's license while holding up an image of another person to be captured. Identification of the person using the captured picture in either case may be inaccurate.
In some implementations, a person may enroll in an identification system at a facility controlled by an entity that operates the identification system or one of its agents. In such an implementation, the entity or its agents may be able to inspect presented identification, perform background checks, monitor how biometrics are captured, and so on in order to validate and/or authenticate the identity of the person who is enrolled. However, this may be burdensome on both the person enrolled and the entity or its agents. Such a burden may be partially or fully mitigated if a person could enroll mobile from the entity or its agents (such as using the person's own cell phone, tablet, laptop, and/or other mobile or non-mobile electronic device) while still allowing the entity or its agents to validate and/or authenticate the identity of the enrolled person.
The following disclosure relates to mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.
In this way, identification systems and/or the electronic devices used in such identification systems may be capable of performing enrollment, identity validation and/or identification and/or authentication, and other functions that they were not previously capable of performing. The identification systems may be thus able to operate more efficiently and consume fewer resources, resulting in improved operation of the identification systems and/or the electronic devices used in and/or with such identification systems.
These and other embodiments are discussed below with reference to FIGS. 1-7. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these Figures is for explanatory purposes only and should not be construed as limiting.
FIG. 1 depicts a first example system 100 for mobile biometric identification system enrollment using a known biometric. The system 100 may include one or more identity system devices 101 and/or electronic devices 102 that may communicate with each other via one or more wired and/or wireless communication networks 103.
The system 100 may perform mobile biometric identification system enrollment using a known biometric. By way of illustration, a person may use a smart phone or other personal electronic device to take an image of one or more of the person's fingerprints. The image or a hash or other digital representation thereof may be used to enroll the person. Prior to use of the image to identify the person, the image may be verified by comparing one or more images of the person's face, iris, retina, and so on to a known picture of the person (such as one obtained from an identity token like a driver's license, state identification card, military identification card, passport, and so on). In some situations, the person may enroll remotely with the fingerprint image and then be prompted to allow the person's facial image to be recorded for verification when the person first attempts to be identified (such as at an airport security screening station, when attempting to access a financial account via the smart phone, at a ticketing station at an event venue, and so on).
In another example, a person may use a smart phone to access an enrollment application for which the person has generated a password-protected account. The person may have configured the application to allow access using a fingerprint sensor feature provided by the smart phone that provides an authentication token associated with the password in response to the person providing a fingerprint matching one stored by the phone. As such, the person may use the application to capture an image of the person's face or portion thereof and the fingerprint sensor feature to authenticate the facial image.
For example, the identity system device 101 may obtain a digital representation of a first biometric for a person from the electronic device 102; enroll the person in a biometric identification system using the digital representation of the first biometric (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person (received from the electronic device 102 and/or from a different electronic device 102) matches a digital representation of a known biometric. The identity system device 101 may be operative to identify the person using the digital representation of the first biometric (received from the electronic device 102 and/or from a different electronic device 102) after verification.
In some implementations, the first and second biometrics may be of different modalities (or different types of biometrics, such as a fingerprint being a first modality and a facial or iris or retina being a second modality). However, in other implementations, the first and second biometrics may be of the same modality (such as fingerprints from different fingers, images of different portions of the person's face, and so on).
By way of another example, the identity system device 101 may obtain a digital representation of a first biometric for a person from the electronic device 102; enroll the person in a biometric identification system using the digital representation of the first biometric (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and upon an initial attempt to identify the person using the first biometric (received from the electronic device 102 and/or from a different electronic device 102), authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person (received from the electronic device 102 and/or from a different electronic device 102) to known biometric data for the person. The identity system device 101 may identify the person using the digital representation of the first biometric (received from the electronic device 102 and/or from a different electronic device 102) after verification.
In still another example, the identity system device 101 may obtain a digital representation of at least one fingerprint for a person from the electronic device 102; obtain an image of an identification token for the person from the electronic device 102; enroll the person in a biometric identification system using the digital representation of the at least one fingerprint (and/or add the digital representation of the first biometric to an existing account for the person in the biometric identification system); and upon an initial attempt to identify the person using the digital representation of the at least one fingerprint, authenticate the digital representation of the at least one fingerprint by matching a digital representation of at least a portion of a facial image for the person (received from the electronic device 102 and/or from a different electronic device 102) to data derived from the image of the identification token. The identity system device 101 may identify the person using the digital representation of the at least one fingerprint (received from the electronic device 102 and/or from a different electronic device 102) after verification.
The identity system device 101 may store and/or track a variety of different information related to the identities of various people. This identity information may include, but is not limited to, one or more names, addresses, telephone numbers, notification preferences and/or other notification information, social security numbers, frequent flyer numbers, financial data, financial account numbers, verified ages, boarding pass data, flight data, movement data, historic movement data, and so on. The identity system device 101 may control access to the identity information as part of responding to requests and/or providing one or more attestations. The identity system device 101 may control access to the identity information using various mechanisms such as through matching of a received hash and/or other digital representation of a biometric with biometric data associated with the identity information, determining that a requestor is authorized to access identity data, receipt of authorized account logins and/or passwords, authorization tokens, and/or other access control mechanisms, and so on. For example, the identity system device 101 may be operative to identify people, authenticate that people have a valid identity token (such as a driver's license, state identification card, military identification card, passport, and so on), authenticate that people have a valid boarding pass and/or other flight or ticket, authorize people to enter an area (such as a security screening checkpoint), and so on.
In various examples, liveness detection may be performed during capture of one or more biometrics. For example, one or more cameras may be used to monitor biometric capture. By way of another example, movement tracking may be performed to ensure that biometrics from a living person are being captured. In other examples, facial recognition biometrics that do not use monitoring for verification may instead use various image and/or video processing techniques that evaluate eye movement or other features or characteristics in the images used for facial recognition during capture, such as by flashing various colored lights and/or sequences of such and evaluating iris dilation responses to the lights as compared to predicted iris dilation responses.
In various examples, where an identification token is scanned and/or otherwise imaged or captured (such as using optical character recognition of text to obtain biographic information), various techniques may be used to authenticate the identification token. For example, white light to authenticate that a piece of identification and/or other identification token is genuine.
The electronic device 102 may be any kind of electronic device. Examples of such devices include, but are not limited to, one or more desktop computing devices, laptop computing devices, mobile computing devices, wearable devices, tablet computing devices, mobile telephones, smart phones, printers, displays, kiosks, vehicles, kitchen appliances, entertainment system devices, digital media players, and so on. The electronic device 102 may include one or more processors 107 and/or other processing units and/or controllers, one or more non-transitory storage media 111 (which may take the form of, but is not limited to, a magnetic storage medium; optical storage medium; magneto-optical storage medium; read only memory; random access memory; erasable programmable memory; flash memory; and so on), one or more input and/or output devices (such as one or more keyboards, computer mice, touch screens, touch pads, track pads, microphones, speakers, displays, buttons, dials, switches, printers, and so on), one or more communication units 110, one or more biometric reader devices 108 (such as a fingerprint scanner, a vein scanner, a palm-vein scanner, an optical fingerprint scanner, a phosphorescent fingerprint scanner, a still image and/or video camera, a 2D and/or 3D image sensor, a capacitive sensor, a saliva sensor, a deoxyribonucleic acid sensor, a heart rhythm monitor, a microphone, and so on), one or more input and/or output components 109 (such as one or more displays, touch screens, track pads, touch pads, keyboards, computer mice, buttons, sliders, microphones, speakers, printers, and so on), and/or one or more other components. The processor 107 may execute one or more sets of instructions stored in the non-transitory storage media 111 to perform various functions, such as using the biometric reader device 108 to obtain one or more digital representations of one or more biometrics (such as one or more hashes and/or other digital representations of one or more fingerprints, vein scans, palm-vein scans, voiceprints, facial images, retina images, iris images, deoxyribonucleic acid sequences, heart rhythms, gaits, and so on) for a person, communicate with the identity system device 101 via the network 103 using the communication unit 110, providing one or more obtained digital representations of biometrics, and so on.
Similarly, the identity system device 101 may be any kind of electronic device and/or cloud and/or other computing arrangement and may include one more processors 104, non-transitory storage media 105, communication units 106, and/or other components. The processor 104 may execute one or more sets of instructions stored in the non-transitory storage medium 105 to perform various functions, such as storing biometric data for people and associated identity information (such as one or more names, addresses, telephone numbers, financial data, financial account numbers, verified ages, insurance identifiers, payment account identifiers, and so on), receive one or more digital representations of biometrics, match one or more received digital representations of biometrics to stored biometric data, retrieve identity information associated with stored biometric data matching one or more received digital representations of biometrics, provide retrieved identity information, communicate with the electronic device 102 via the network 103 using the communication unit 106, and so on.
Although the system 100 is illustrated and described as including particular components arranged in a particular configuration that perform particular functions, it is understood that this is an example. In various implementations, various arrangements of various components that perform various functions may be implemented without departing from the scope of the present disclosure.
For example, the system 100 is illustrated as including one electronic device 102. However, it is understood that this is an example. In some implementations, the system may include multiple electronic devices 102. For example, a person may use a first electronic device 102 (such as a personal smart phone, laptop computing device, desktop computing device, digital media player, kiosk or other station, wearable device, and so on) to enroll and then get identified and/or have one or more previously provided biometrics verified by a second electronic device 102 (such as a security screening station, a ticketing station, a kiosk or other station, and so on). Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 2A depicts a first portion of an example implementation of the system 100 of FIG. 1. In this example, a person 220 may use a smart phone 202A to enroll by capturing one or more images of one or more of the person's fingerprints using a camera 208A of the smart phone 202A. After enrolling, the person 220 may then go to a place and attempt to provide the fingerprint to identify himself.
For example, FIG. 2B depicts a second portion of the example implementation of the system 100 of FIG. 1 shown in FIG. 2A. In this example, the person 220 may attempt to enter a security screening gate 202B at an airport by providing the fingerprint via a fingerprint scanner 208B. As this is the first time that the person 220 has attempted to identify himself using the fingerprint, the fingerprint may not yet be verified. As such, a camera 208C may capture (whether automatically and/or in response to prompting the person 220) an image of the person's face to compare to a known image of the person's face (such as one captured from the person's driver's license or other identity token scanned during enrollment). If there is a match, the person's fingerprint may be verified and may then be used for identification. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 3 depicts a flow chart illustrating a first example method 300 for mobile biometric identification system enrollment using a known biometric. This method 300 may be performed by the system 100 of FIG. 1.
At operation 310, an electronic device (such as the identity system device 101 of FIG. 1), may obtain a digital representation of a first biometric. At operation 320, the electronic device may obtain a digital representation of a second biometric. At operation 330, the electronic device may compare the digital representation of the second biometric to known biometric data (such as a scan of picture of person or a portion thereof from an identification token like a driver's license). At operation 340, the electronic device may determine if there is a match. If not, the flow may proceed to operation 350 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 360 where the electronic device may authenticate the first biometric by authorizing the first biometric for use in identification.
For example, the digital representation of the first biometric may be a fingerprint and the digital representation of the second biometric may be a portion of a facial image. In another example, the digital representation of the first biometric may be a portion of a facial image and the digital representation of the second biometric may be a fingerprint. In some examples, the first and second biometrics may be of the same modality. In other examples, the first and second biometrics may be of different modalities. In various examples, the digital representation of the first biometric and the digital representation of the second biometric may be received from different devices (such as a tablet computing device and a ticketing station). In other examples, the digital representation of the first biometric and the digital representation of the second biometric may be received from the same device (such as a laptop computing device that is used to enroll in a biometric identification service using the first biometric and then authenticate the first biometric using the second biometric).
By way of illustration, a person may use an app on a smart phone or other mobile device to capture images of one or more of the person's fingerprints and at least a portion of the person's face using a camera or other 2D or 3D image sensor or 3D scanner. The person may already have an account with a biometric identification service associated with the app and may previously have provided the fingerprint while monitored by an authorized agent. In such a scenario, the facial image or digital representation thereof may be verified by matching the fingerprint image or digital representation thereof to the previously verified fingerprint data. The verified facial image or digital representation thereof may then be associated with the person's account with the biometric identification service. Alternatively, in another example, the person may have previously verified a facial image and the fingerprint image or digital representation thereof may be verified by matching the facial image or digital representation thereof to the previously verified facial data. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
By way of another illustration, a person may use an app on a smart phone or other mobile device to capture images of one or more of the person's fingerprints, at least a portion of the person's face, and an identification token such as a driver's license using a camera or other 2D or 3D image sensor or 3D scanner. The app may capture the facial image and the fingerprint image to ensure that the images come from the same person (such as by monitoring capture of both, by taking both at the same time, and so on). The fingerprint image may be verified by matching the facial image or digital representation thereof to an image of at least a portion of the person obtained from the identification token. The app may then enroll the person in a biometric identification service using the fingerprint image or digital representation thereof and/or the facial image or digital representation thereof and/or the image of the identification token or digital representation thereof. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
Although the above describes obtaining the known biometric by capturing one or more images of the identification token using a camera or other 2D or 3D image sensor or 3D scanner, it is understood that this is an example. In some implementations, an identification token may include a data storage and/or other encoding mechanism that is operative to store biometric data for a person alternatively and/or additionally to including a picture of at least a portion of the person, such as an identification token that includes a picture of at least a portion of a person and a data storage component storing a digital version of the picture. For example, an identification token may include a smart chip, non-transitory storage medium, and so on that may store and/or encode known biometric data for a person associated with the identification token. The identification token may also include one or more mechanisms for retrieving the stored and/or encoded known biometric data (such as magnetically, optically via one or more bar codes or similar mechanisms, radio frequency identification or other near field or other wireless communication, one or more communication contacts and so on. In such implementations, the known biometric data may be retrieved from where it is stored and/or encoded by the identification token and compared to verify one or more obtained digital representations of one or more biometrics. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
In various examples, this example method 300 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1.
Although the example method 300 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
For example, the method 300 is illustrated and described as both obtaining the first and second biometrics and authorizing the first biometric for use in identification. However, it is understood that this is an example. In various implementations, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 4 depicts a flow chart illustrating a second example method 400 for mobile biometric identification system enrollment using a known biometric. This method 400 may be performed by the system 100 of FIG. 1.
At operation 401, an electronic device (such as the identity system device 101 of FIG. 1), may obtain a digital representation of a first biometric. At operation 402, the electronic device may scan an identification token or obtain such a scan or other image. Scanning the identification token may include capturing a picture on the identification token, obtaining biographic information from the identification token, authenticating that the identification token is valid, and so on. At operation 403, the electronic device may use the digital representation of the first biometric and/or the scan to enroll in a biometric identification system.
At operation 404, the electronic device may determine whether or not an identification is requested using the identification system. For example, a person may provide a biometric at a security screening station. If not, the flow returns to operation 404 where the electronic device again determines whether or not an identification is requested. Otherwise, the flow may proceed to operation 405 where the electronic device may determine whether or not the digital representation of the first biometric is verified or authenticated.
For example, the digital representation of the first biometric may not be verified if this is the first time that the person has attempted identification. If the digital representation of the first biometric is verified, the flow may proceed to operation 406 where the electronic device may perform an identification using the digital representation of the first biometric. Otherwise, the flow may proceed to operation 407 where the electronic device may obtain a digital representation of a second biometric.
The flow may then proceed to operation 408 where the electronic device may determine whether or not the digital representation of the second biometric matches the scan of the identification token. If not, the flow may proceed to operation 410 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 409 where the electronic device may authenticate or verify the digital representation of the first biometric before proceeding to operation 406 and performing an identification using the digital representation of the first biometric.
In various examples, this example method 400 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1.
Although the example method 400 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
For example, the method 400 is illustrated and described as both enrolling in the biometric identification system and using the biometric identification system to identify. However, it is understood that this is an example. In various implementations, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 5 depicts a flow chart illustrating a third example method 500 for mobile biometric identification system enrollment using a known biometric. This method 500 may be performed by the system 100 of FIG. 1.
At operation 510, an electronic device (such as the identity system device 101 of FIG. 1), may obtain a digital representation of one or more fingerprints. At operation 520, the electronic device may scan an identification token. At operation 530, the electronic device may use the digital representation of the fingerprint and/or the scan to enroll in a biometric identification system. At operation 540, the electronic device may determine whether or not an identification using the digital representation of the fingerprint is requested. If not, the flow returns to operation 540 where the electronic device again determines whether or not an identification using the digital representation of the fingerprint is requested. Otherwise, the flow may proceed to operation 550 where the electronic device may determine whether or not the digital representation of the fingerprint is verified or authenticated. If the digital representation of the fingerprint is verified, the flow may proceed to operation 580 where the electronic device may perform an identification using the digital representation of the fingerprint. Otherwise, the flow may proceed to operation 560 where the electronic device may determine whether or not a digital representation of at least a portion of a facial image matches a portion of a picture from the identification token. If not, the flow may proceed to operation 590 where the electronic device may determine that an error has occurred. Otherwise, the flow may proceed to operation 570 where the electronic device may authenticate or verify the digital representation of the fingerprint before proceeding to operation 580 and performing an identification using the digital representation of the fingerprint.
In various examples, this example method 500 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1.
Although the example method 500 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
For example, the method 500 is illustrated and described as matching a facial image to a known facial image to authenticate a fingerprint. However, it is understood that this is an example. In other examples, a fingerprint may be compared to a known fingerprint in order to authenticate a facial image. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 6 depicts a flow chart illustrating a fourth example method 600 for mobile biometric identification system enrollment using a known biometric. This method 600 may be performed by the system 100 of FIG. 1.
At operation 601, a system (such as the system 100 of FIG. 1), may allow a person to choose to enroll fingerprints in a biometric identification system. At operation 602, the system may provide instructions for enrolling the fingerprints. At operation 603, the system may allow the person to position the person's hand for capture of one or more images of the fingerprints. At operation 604, the system may capture one or more images of the fingerprints (such as a white light color picture of the fingers that may be converted into Wavelet Scalar Quantization or “WSQ” compatible images). At operation 605, the system may confirm capture of the image of the fingerprints.
At operation 606, the system may submit the image and/or a hash or other digital representation thereof. At operation 607, the system may process enrollment to a biometrics service of the biometric identification system using the image.
At operation 608, the system may use the image for identification. At operation 609, the system may determine whether or not the user is identified. If not, the flow may proceed to operation 610 where the process ends. Otherwise, the flow may proceed to operation 611 where the system determines whether or not this is the first time the image has been used for identification.
If not, the flow may proceed to operation 612 where the system may allow access. Otherwise, the flow may proceed to operation 613 where the system may prompt the person to look at a camera or other 2D and/or 3D image sensor for facial verification. At operation 614, the system may determine whether or not the facial image captured as part of the facial verification matches a stored facial image. If so, the flow may proceed to operation 612 where the system may allow access. Otherwise, the flow may proceed to operation 615 where the system may send a false identification alert and suspend and/or lock the person's account in the biometric identification system before the flow proceeds to operation 610 and ends.
In various examples, this example method 600 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1.
Although the example method 600 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
For example, the method 600 includes operations related to providing instruction for biometric capture, enrolling, and identification. However, it is understood that this is an example. In other examples, one or more of these operations may be omitted. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
By way of another example, the method 600 is illustrated and described as authenticating the fingerprints using facial recognition the first time that the fingerprints are used. However, in some examples, fingerprint or other biometric capture may either be monitored (such as by an authorized agent of the biometric identification system) or submitted remotely. In such an example, the fingerprints or other biometrics may be flagged as monitored or unmonitored during capture. Monitored captures may not be verified using facial or other biometric recognition upon first use whereas unmonitored captures may be. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
By way of yet another example, the method 600 is illustrated and described as authenticating biometrics of a fingerprint modality using biometrics of a facial modality. However, it is understood that this is an example. In various implementations, biometrics of one or more different modalities other than fingerprints may be verified using biometrics of one or more modalities other than facial images. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
In yet another example, the method 600 is illustrated and described as using facial images to authenticate fingerprints upon first identification. However, it is understood that this is an example. In other implementations, the person may provide fingerprints for enrollment and then identify using facial recognition. In such an example, the person may be verified and may then use either facial recognition or fingerprints for identification without any further verification. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
By way of still another example, the method 600 is illustrated and described as authenticating the fingerprints using facial recognition only the first time the fingerprints are used. However, it is understood that this is an example. In some examples, the fingerprints may be verified various numbers of times. By way of illustration, different entities may authenticate the fingerprints and some may be more reliable than others. When a more reliable entity performs the verification, verification may be performed fewer times than when a less reliable entity performs the verification. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
FIG. 7 depicts a flow chart illustrating a fifth example method 700 for mobile biometric identification system enrollment using a known biometric. This method 700 may be performed by the system 100 of FIG. 1.
At operation 710, an electronic device (such as the identity system device 101 of FIG. 1), may obtain a digital representation of a first biometric using one or more apps or applications. At operation 720, the electronic device may receive an authorization and/or other token indicating that a digital representation of a second biometric was provided that corresponds to an account for the app. At operation 730, the electronic device may use the digital representation of the first biometric for identification.
In various examples, this example method 700 may be implemented as a group of interrelated software modules or components that perform various functions discussed herein. These software modules or components may be executed within a cloud network and/or by one or more computing devices, such as the identity system device 101 of FIG. 1.
Although the example method 700 is illustrated and described as including particular operations performed in a particular order, it is understood that this is an example. In various implementations, various orders of the same, similar, and/or different operations may be performed without departing from the scope of the present disclosure.
For example, operation 730 is illustrated and described as using the electronic device using the digital representation of the first biometric for identification. However, it is understood that this is an example. In various implementations, the electronic device may perform operation 730 by enrolling a person who provided the digital representation of the first biometric in a biometric identification system using the digital representation of the first biometric. Various configurations are possible and contemplated without departing from the scope of the present disclosure.
In various implementations, a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit may execute the instructions to obtain a digital representation of at least one fingerprint for a person; obtain an image of an identification token for the person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to data derived from the image of the identification token; and identify the person using the digital representation of the first biometric after verification.
In some examples, liveness detection may be performed during capture of the digital representation of the first biometric. In various examples, the identification token may be at least one of a state identification card, a driver's license, a military identification card, or a passport. In a number of examples, the identification token may include at least a picture of at least a portion of the person. In some such examples, the biometric data may be derived from the picture of the at least the portion of the person. In various examples, the digital representation of the first biometric and the digital representation of the second biometric may be received from different electronic devices. In a number of examples, the digital representation of the first biometric and the digital representation of the second biometric may be received by a same electronic device.
In some implementations, a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit may execute the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; upon an initial attempt to identify the person using the digital representation of the first biometric, authenticate the digital representation of the first biometric by matching a digital representation of a second biometric for the person to known biometric data for the person; and identify the person using the digital representation of the first biometric after verification.
In various examples, the first biometric may be at least one fingerprint and the second biometric may be at least a portion of a face. In some examples, the first biometric may be at least a portion of a face and the second biometric may be at least one fingerprint. In a number of examples, the digital representation of the first biometric may be received from an electronic device controlled by the person. In various examples, the first biometric may be of a first modality and the second biometric may be of a second modality. In a number of examples, the first biometric and the second biometric may be of a same modality. In some examples, the at least one processing unit may prompt for the digital representation of the second biometric.
In a number of implementations, a system for mobile biometric identification enrollment may include at least one non-transitory storage medium that stores instructions and at least one processing unit. The at least one processing unit may execute the instructions to obtain a digital representation of a first biometric for a person; enroll the person in a biometric identification system using the digital representation of the first biometric; authenticate the digital representation of the first biometric by determining that a digital representation of a second biometric for the person matches a digital representation of the known biometric; and identify the person using the digital representation of the first biometric after verification.
In some examples, the at least one processing unit may receive an indication that the digital representation of the second biometric matches the digital representation of the known biometric. In various of such examples, the indication may be an authorization token. In a number of examples, the at least one processing unit may not be able to access the digital representation of the second biometric. In various examples, the at least one processing unit may authenticate the digital representation of the first biometric when identifying the person using the digital representation of the first biometric. In some examples, the at least one processing unit may disable identification for the person upon unsuccessfully attempting to authenticate the digital representation of the first biometric.
Although the above illustrates and describes a number of embodiments, it is understood that these are examples. In various implementations, various techniques of individual embodiments may be combined without departing from the scope of the present disclosure.
As described above and illustrated in the accompanying figures, the present disclosure relates to mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.
The present disclosure recognizes that biometric and/or other personal data is owned by the person from whom such biometric and/or other personal data is derived. This data can be used to the benefit of those people. For example, biometric data may be used to conveniently and reliably identify and/or authenticate the identity of people, access securely stored financial and/or other information associated with the biometric data, and so on. This may allow people to avoid repeatedly providing physical identification and/or other information.
The present disclosure further recognizes that the entities who collect, analyze, store, and/or otherwise use such biometric and/or other personal data should comply with well-established privacy policies and/or privacy practices. Particularly, such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining security and privately maintaining biometric and/or other personal data, including the use of encryption and security methods that meets or exceeds industry or government standards. For example, biometric and/or other personal data should be collected for legitimate and reasonable uses and not shared or sold outside of those legitimate uses. Further, such collection should occur only after receiving the informed consent. Additionally, such entities should take any needed steps for safeguarding and securing access to such biometric and/or other personal data and ensuring that others with access to the biometric and/or other personal data adhere to the same privacy policies and practices. Further, such entities should certify their adherence to widely accepted privacy policies and practices by subjecting themselves to appropriate third party evaluation.
Additionally, the present disclosure recognizes that people may block the use of, storage of, and/or access to biometric and/or other personal data. Entities who typically collect, analyze, store, and/or otherwise use such biometric and/or other personal data should implement and consistently prevent any collection, analysis, storage, and/or other use of any biometric and/or other personal data blocked by the person from whom such biometric and/or other personal data is derived.
In the present disclosure, the methods disclosed may be implemented as sets of instructions or software readable by a device. Further, it is understood that the specific order or hierarchy of steps in the methods disclosed are examples of sample approaches. In other embodiments, the specific order or hierarchy of steps in the method can be rearranged while remaining within the disclosed subject matter. The accompanying method claims present elements of the various steps in a sample order, and are not necessarily meant to be limited to the specific order or hierarchy presented.
The described disclosure may be provided as a computer program product, or software, that may include a non-transitory machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure. A non-transitory machine-readable medium includes any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). The non-transitory machine-readable medium may take the form of, but is not limited to, a magnetic storage medium (e.g., floppy diskette, video cassette, and so on); optical storage medium (e.g., CD-ROM); magneto-optical storage medium; read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; and so on.
The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the described embodiments. However, it will be apparent to one skilled in the art that the specific details are not required in order to practice the described embodiments. Thus, the foregoing descriptions of the specific embodiments described herein are presented for purposes of illustration and description. They are not targeted to be exhaustive or to limit the embodiments to the precise forms disclosed. It will be apparent to one of ordinary skill in the art that many modifications and variations are possible in view of the above teachings.

Claims (20)

What is claimed is:
1. A system for biometric identification, comprising:
at least one non-transitory storage medium that stores instructions; and
at least one processing unit that executes the instructions to:
obtain a first digital representation of a biometric for a person;
store the first digital representation of the biometric for the person for subsequent identification;
obtain a second digital representation of a biometric for the person, the first digital representation of the biometric for the person not being identical to the second digital representation of the biometric for the person;
upon identifying the person using the first digital representation of the biometric for the person, store the second digital representation of the biometric for the person for subsequent identification;
obtain a third digital representation of a biometric for the person; and
attempt to identify the person by comparing the third digital representation of the biometric for the person to the second digital representation of the biometric for the person.
2. The system of claim 1, wherein the at least one processing unit attempts to identify the person by comparing the third digital representation of the biometric for the person to the second digital representation of the biometric for the person and the first digital representation of the biometric for the person.
3. The system of claim 1, wherein the first digital representation of the biometric for the person corresponds to a fingerprint.
4. The system of claim 1, wherein the first digital representation of the biometric for the person corresponds to a palm-vein scan.
5. The system of claim 1, wherein the at least one processing unit identifies the person to obtain stored financial information for the person.
6. The system of claim 5, wherein the stored financial information for the person includes a financial account number.
7. The system of claim 1, wherein the second digital representation of the biometric for the person is obtained from a palm-vein scanner.
8. The system of claim 1, wherein the at least one processing unit determines a degree of certainty that the second digital representation of the biometric for the person corresponds to the person.
9. The system of claim 1, wherein the at least one processing unit verifies an identity associated with the person.
10. A system for biometric identification, comprising:
at least one non-transitory storage medium that stores instructions; and
at least one processing unit that executes the instructions to:
identify a person using a first digital representation of a biometric for the person after receiving a second digital representation of a biometric for the person, the first digital representation of the biometric for the person not being identical to the second digital representation of the biometric for the person;
store the second digital representation of the biometric for the person for subsequent identification; and
attempt to identify the person by comparing a third digital representation of a biometric for the person to the second digital representation of the biometric for the person.
11. The system of claim 10, wherein the at least one processing unit stores financial account information associated with the first digital representation of the biometric for the person.
12. The system of claim 11, wherein the at least one processing unit associates the financial account information with the second digital representation of the biometric for the person.
13. The system of claim 10, wherein the first digital representation of the biometric for the person and the second digital representation of the biometric for the person have a same modality.
14. The system of claim 10, wherein the at least one processing unit attempts to identify the person by comparing the third digital representation of the biometric for the person to the second digital representation of the biometric for the person and the first digital representation of the biometric for the person.
15. A system for biometric identification, comprising:
at least one non-transitory storage medium that stores instructions; and
at least one processing unit that executes the instructions to:
store a first digital representation of a biometric for a person for performing identifications;
obtain a second digital representation of a biometric for the person;
upon determining the second digital representation of the biometric for the person is different from the first digital representation of the biometric for the person, store the second digital representation of the biometric for the person for subsequent identification;
obtain a third digital representation of a biometric for the person; and
attempt to identify the person by comparing the third digital representation of the biometric for the person to the second digital representation of the biometric for the person.
16. The system of claim 15, wherein the at least one processing unit obtains information from a token for the person.
17. The system of claim 16, wherein the token corresponds to a financial account.
18. The system of claim 16, wherein the information comprises a financial account number.
19. The system of claim 15, wherein the at least one processing unit attempts to identify the person by comparing the third digital representation of the biometric for the person to the second digital representation of the biometric for the person and the first digital representation of the biometric for the person.
20. The system of claim 15, wherein the at least one processing unit attempts to identify the person as part of the person purchasing goods or services.
US17/224,765 2019-04-03 2021-04-07 Mobile enrollment using a known biometric Active 2039-06-07 US11496471B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US17/224,765 US11496471B2 (en) 2019-04-03 2021-04-07 Mobile enrollment using a known biometric
US17/977,524 US11716330B2 (en) 2019-04-03 2022-10-31 Mobile enrollment using a known biometric
US18/209,433 US11997087B2 (en) 2019-04-03 2023-06-13 Mobile enrollment using a known biometric
US18/643,874 US20240275781A1 (en) 2019-04-03 2024-04-23 Mobile enrollment using a known biometric

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16/374,576 US10523671B1 (en) 2019-04-03 2019-04-03 Mobile enrollment using a known biometric
US16/729,958 US10938809B2 (en) 2019-04-03 2019-12-30 Mobile enrollment using a known biometric
US17/153,415 US11503021B2 (en) 2019-04-03 2021-01-20 Mobile enrollment using a known biometric
US17/224,765 US11496471B2 (en) 2019-04-03 2021-04-07 Mobile enrollment using a known biometric

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/153,415 Continuation US11503021B2 (en) 2019-04-03 2021-01-20 Mobile enrollment using a known biometric

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/977,524 Continuation US11716330B2 (en) 2019-04-03 2022-10-31 Mobile enrollment using a known biometric

Publications (2)

Publication Number Publication Date
US20210226948A1 US20210226948A1 (en) 2021-07-22
US11496471B2 true US11496471B2 (en) 2022-11-08

Family

ID=69057754

Family Applications (7)

Application Number Title Priority Date Filing Date
US16/374,576 Active US10523671B1 (en) 2019-04-03 2019-04-03 Mobile enrollment using a known biometric
US16/729,958 Active US10938809B2 (en) 2019-04-03 2019-12-30 Mobile enrollment using a known biometric
US17/153,415 Active 2039-08-21 US11503021B2 (en) 2019-04-03 2021-01-20 Mobile enrollment using a known biometric
US17/224,765 Active 2039-06-07 US11496471B2 (en) 2019-04-03 2021-04-07 Mobile enrollment using a known biometric
US17/977,524 Active US11716330B2 (en) 2019-04-03 2022-10-31 Mobile enrollment using a known biometric
US18/209,433 Active US11997087B2 (en) 2019-04-03 2023-06-13 Mobile enrollment using a known biometric
US18/643,874 Pending US20240275781A1 (en) 2019-04-03 2024-04-23 Mobile enrollment using a known biometric

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US16/374,576 Active US10523671B1 (en) 2019-04-03 2019-04-03 Mobile enrollment using a known biometric
US16/729,958 Active US10938809B2 (en) 2019-04-03 2019-12-30 Mobile enrollment using a known biometric
US17/153,415 Active 2039-08-21 US11503021B2 (en) 2019-04-03 2021-01-20 Mobile enrollment using a known biometric

Family Applications After (3)

Application Number Title Priority Date Filing Date
US17/977,524 Active US11716330B2 (en) 2019-04-03 2022-10-31 Mobile enrollment using a known biometric
US18/209,433 Active US11997087B2 (en) 2019-04-03 2023-06-13 Mobile enrollment using a known biometric
US18/643,874 Pending US20240275781A1 (en) 2019-04-03 2024-04-23 Mobile enrollment using a known biometric

Country Status (1)

Country Link
US (7) US10523671B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210357487A1 (en) * 2020-05-13 2021-11-18 Alclear, Llc Modular biometric station with cohesive form factor

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11144772B2 (en) * 2017-01-12 2021-10-12 Zkteco Co., Ltd. Method and system for fingerprint security
US11741203B1 (en) * 2019-03-01 2023-08-29 Alclear, Llc Mobile identity information controlled device
US12087112B2 (en) * 2020-07-28 2024-09-10 Carrier Corporation Access control accessibility
US11874909B1 (en) * 2021-04-23 2024-01-16 Ideal Innovations, Inc. Two-phase biometric access control system (TBACS)
US20240039728A1 (en) * 2022-07-27 2024-02-01 Mastercard International Incorporated Efficient user control of their data stored in a centralised biometric database

Citations (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221303A1 (en) 2001-11-20 2004-11-04 Starz Encore Group Llc Parental controls using view limits
US20060110011A1 (en) * 2004-11-19 2006-05-25 Cohen Mark S Method and apparatus for producing a biometric identification reference template
US7308581B1 (en) * 2003-03-07 2007-12-11 Traffic101.Com Systems and methods for online identity verification
US20080289020A1 (en) * 2007-05-15 2008-11-20 Microsoft Corporation Identity Tokens Using Biometric Representations
US20090037978A1 (en) * 2004-12-22 2009-02-05 Merkatum Corporation Self-adaptive multimodal biometric authentication method and system for performance thereof
US20120139703A1 (en) * 2009-08-13 2012-06-07 Thomas Szoke Intelligent Peripheral Device and System for the Authentication and Verification of Individuals and/or Documents Through a Secure Multifunctional Authentication Service with Data Storage Capability
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
US8381969B1 (en) 2011-04-28 2013-02-26 Amazon Technologies, Inc. Method and system for using machine-readable codes to perform a transaction
US8423462B1 (en) 2009-05-01 2013-04-16 Amazon Technologies, Inc. Real-time mobile wallet server
US8521131B1 (en) 2010-03-23 2013-08-27 Amazon Technologies, Inc. Mobile device security
US20140189720A1 (en) 2012-12-27 2014-07-03 Alex Terrazas Methods and apparatus to determine engagement levels of audience members
US20140188770A1 (en) * 2011-05-10 2014-07-03 Foteini Agrafioti System and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals
US20140289833A1 (en) * 2013-03-22 2014-09-25 Marc Briceno Advanced authentication techniques and applications
US8887259B1 (en) * 2011-12-06 2014-11-11 Imageware Systems, Inc. Anonymous biometric verification
US20140359722A1 (en) * 2013-05-31 2014-12-04 Verizon Patent And Licensing Inc. Method and apparatus for providing multi-sensor multi-factor identity verification
US8965170B1 (en) 2012-09-04 2015-02-24 Google Inc. Automatic transition of content based on facial recognition
US20150294515A1 (en) 2013-05-23 2015-10-15 Bytemark, Inc. Systems and methods for electronic ticket validation using proximity detection for two or more tickets
US9166961B1 (en) 2012-12-11 2015-10-20 Amazon Technologies, Inc. Social networking behavior-based identity system
US9202105B1 (en) 2012-01-13 2015-12-01 Amazon Technologies, Inc. Image analysis for user authentication
US20160012217A1 (en) * 2014-07-10 2016-01-14 Bundesdruckerei Gmbh Mobile terminal for capturing biometric data
US9324098B1 (en) 2008-07-22 2016-04-26 Amazon Technologies, Inc. Hosted payment service system and method
US20160127359A1 (en) * 2014-11-01 2016-05-05 RONALD Henry Minter Compliant authentication based on dynamically-updated crtedentials
US20160189063A1 (en) 2014-12-31 2016-06-30 Stubhub, Inc. Systems and methods for event admissions based on fingerprint recognition
US9607138B1 (en) 2013-12-18 2017-03-28 Amazon Technologies, Inc. User authentication and verification through video analysis
US9681350B1 (en) 2015-09-15 2017-06-13 Sprint Spectrum L.P. Differential routing of voice handover traffic and non-voice handover traffic in response to congestion on an inter-base-station interface
US20170188103A1 (en) 2015-12-29 2017-06-29 Le Holdings (Beijing) Co., Ltd. Method and device for video recommendation based on face recognition
US9836642B1 (en) 2012-12-18 2017-12-05 Amazon Technologies, Inc. Fraud detection for facial recognition systems
US20180007060A1 (en) 2016-06-30 2018-01-04 Amazon Technologies, Inc. Multi-Factor Authentication to Access Services
US9876788B1 (en) * 2014-01-24 2018-01-23 Microstrategy Incorporated User enrollment and authentication
US9967250B2 (en) 2011-10-19 2018-05-08 Amazon Technologies, Inc. Confidence-based authentication
US10027662B1 (en) 2016-12-06 2018-07-17 Amazon Technologies, Inc. Dynamic user authentication
US10055740B2 (en) 2011-06-27 2018-08-21 Amazon Technologies, Inc. Payment selection and authorization
US10104181B1 (en) 2015-12-30 2018-10-16 Amazon Technologies, Inc. Secure context-based group collaboration and communication
US10108791B1 (en) 2015-03-19 2018-10-23 Amazon Technologies, Inc. Authentication and fraud detection based on user behavior
US20180337917A1 (en) * 2017-05-17 2018-11-22 Bank Of America Corporation System for electronic authentication with live user determination
US20190050631A1 (en) 2016-02-26 2019-02-14 Nec Corporation Face recognition system, face recognition method, and storage medium
US10243945B1 (en) 2013-10-28 2019-03-26 Amazon Technologies, Inc. Managed identity federation
US20190213311A1 (en) * 2014-08-28 2019-07-11 Facetec, Inc. Method to verify identity using a previously collected biometric image/data
US10395128B2 (en) * 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication
US11151481B1 (en) 2016-09-28 2021-10-19 Amazon Technologies, Inc. Ticketless entry and tracking

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10846391B1 (en) * 2017-04-24 2020-11-24 Architecture Technology Corporation Secure authentication using fast authentication factors
US10579783B1 (en) * 2017-07-31 2020-03-03 Square, Inc. Identity authentication verification

Patent Citations (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221303A1 (en) 2001-11-20 2004-11-04 Starz Encore Group Llc Parental controls using view limits
US7308581B1 (en) * 2003-03-07 2007-12-11 Traffic101.Com Systems and methods for online identity verification
US20100322487A1 (en) * 2003-03-07 2010-12-23 Armen Geosimonian Systems and methods for online identity verification
US20060110011A1 (en) * 2004-11-19 2006-05-25 Cohen Mark S Method and apparatus for producing a biometric identification reference template
US20090037978A1 (en) * 2004-12-22 2009-02-05 Merkatum Corporation Self-adaptive multimodal biometric authentication method and system for performance thereof
US20080289020A1 (en) * 2007-05-15 2008-11-20 Microsoft Corporation Identity Tokens Using Biometric Representations
US9324098B1 (en) 2008-07-22 2016-04-26 Amazon Technologies, Inc. Hosted payment service system and method
US8423462B1 (en) 2009-05-01 2013-04-16 Amazon Technologies, Inc. Real-time mobile wallet server
US8744966B1 (en) 2009-05-01 2014-06-03 Amazon Technologies, Inc. Real-time mobile wallet server
US10235669B2 (en) 2009-05-01 2019-03-19 Amazon Technologies, Inc. Real-time mobile wallet server
US20120139703A1 (en) * 2009-08-13 2012-06-07 Thomas Szoke Intelligent Peripheral Device and System for the Authentication and Verification of Individuals and/or Documents Through a Secure Multifunctional Authentication Service with Data Storage Capability
US9723131B1 (en) 2010-03-23 2017-08-01 Amazon Technologies, Inc. Mobile device security
US9681359B2 (en) 2010-03-23 2017-06-13 Amazon Technologies, Inc. Transaction completion based on geolocation arrival
US9609577B1 (en) 2010-03-23 2017-03-28 Amazon Technologies, Inc. Mobile device security
US9107064B1 (en) 2010-03-23 2015-08-11 Amazon Technologies, Inc. Mobile device security
US8521131B1 (en) 2010-03-23 2013-08-27 Amazon Technologies, Inc. Mobile device security
US9386507B1 (en) 2010-03-23 2016-07-05 Amazon Technologies, Inc. Mobile device security
US8381969B1 (en) 2011-04-28 2013-02-26 Amazon Technologies, Inc. Method and system for using machine-readable codes to perform a transaction
US20140188770A1 (en) * 2011-05-10 2014-07-03 Foteini Agrafioti System and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals
US10055740B2 (en) 2011-06-27 2018-08-21 Amazon Technologies, Inc. Payment selection and authorization
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
US9967250B2 (en) 2011-10-19 2018-05-08 Amazon Technologies, Inc. Confidence-based authentication
US8887259B1 (en) * 2011-12-06 2014-11-11 Imageware Systems, Inc. Anonymous biometric verification
US9934504B2 (en) 2012-01-13 2018-04-03 Amazon Technologies, Inc. Image analysis for user authentication
US9202105B1 (en) 2012-01-13 2015-12-01 Amazon Technologies, Inc. Image analysis for user authentication
US10108961B2 (en) 2012-01-13 2018-10-23 Amazon Technologies, Inc. Image analysis for user authentication
US10242364B2 (en) 2012-01-13 2019-03-26 Amazon Technologies, Inc. Image analysis for user authentication
US8965170B1 (en) 2012-09-04 2015-02-24 Google Inc. Automatic transition of content based on facial recognition
US9166961B1 (en) 2012-12-11 2015-10-20 Amazon Technologies, Inc. Social networking behavior-based identity system
US20190036939A1 (en) 2012-12-11 2019-01-31 Amazon Technologies, Inc. Social networking behavior-based identity system
US10122727B2 (en) 2012-12-11 2018-11-06 Amazon Technologies, Inc. Social networking behavior-based identity system
US9836642B1 (en) 2012-12-18 2017-12-05 Amazon Technologies, Inc. Fraud detection for facial recognition systems
US20140189720A1 (en) 2012-12-27 2014-07-03 Alex Terrazas Methods and apparatus to determine engagement levels of audience members
US20140289833A1 (en) * 2013-03-22 2014-09-25 Marc Briceno Advanced authentication techniques and applications
US20150294515A1 (en) 2013-05-23 2015-10-15 Bytemark, Inc. Systems and methods for electronic ticket validation using proximity detection for two or more tickets
US20140359722A1 (en) * 2013-05-31 2014-12-04 Verizon Patent And Licensing Inc. Method and apparatus for providing multi-sensor multi-factor identity verification
US10243945B1 (en) 2013-10-28 2019-03-26 Amazon Technologies, Inc. Managed identity federation
US9607138B1 (en) 2013-12-18 2017-03-28 Amazon Technologies, Inc. User authentication and verification through video analysis
US9876788B1 (en) * 2014-01-24 2018-01-23 Microstrategy Incorporated User enrollment and authentication
US20160012217A1 (en) * 2014-07-10 2016-01-14 Bundesdruckerei Gmbh Mobile terminal for capturing biometric data
US20190213311A1 (en) * 2014-08-28 2019-07-11 Facetec, Inc. Method to verify identity using a previously collected biometric image/data
US20160127359A1 (en) * 2014-11-01 2016-05-05 RONALD Henry Minter Compliant authentication based on dynamically-updated crtedentials
US20160189063A1 (en) 2014-12-31 2016-06-30 Stubhub, Inc. Systems and methods for event admissions based on fingerprint recognition
US10108791B1 (en) 2015-03-19 2018-10-23 Amazon Technologies, Inc. Authentication and fraud detection based on user behavior
US9681350B1 (en) 2015-09-15 2017-06-13 Sprint Spectrum L.P. Differential routing of voice handover traffic and non-voice handover traffic in response to congestion on an inter-base-station interface
US20170188103A1 (en) 2015-12-29 2017-06-29 Le Holdings (Beijing) Co., Ltd. Method and device for video recommendation based on face recognition
US10104181B1 (en) 2015-12-30 2018-10-16 Amazon Technologies, Inc. Secure context-based group collaboration and communication
US20190050631A1 (en) 2016-02-26 2019-02-14 Nec Corporation Face recognition system, face recognition method, and storage medium
US20180007060A1 (en) 2016-06-30 2018-01-04 Amazon Technologies, Inc. Multi-Factor Authentication to Access Services
US11151481B1 (en) 2016-09-28 2021-10-19 Amazon Technologies, Inc. Ticketless entry and tracking
US10027662B1 (en) 2016-12-06 2018-07-17 Amazon Technologies, Inc. Dynamic user authentication
US20180337917A1 (en) * 2017-05-17 2018-11-22 Bank Of America Corporation System for electronic authentication with live user determination
US10395128B2 (en) * 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Garud et al., "Face Liveness Detection," 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), https://ieeexplore.ieee.org/stamp/stamp.jsp?tp&arnumber=7877695&tag=1, 2016.
Lu et al., "Multimodal Biometric Identification Approach Based on Face and Palmprint," Second International Symposium on Electronic Commerce and Security, https://ieexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5209828, 2009.
MB et al., "A Web Enabled Secured System for Attendance Monitoring and Real Time Location Tracking Using Biometric and Radio Frequency Identification (RFID) Technology," ICCCI, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7218103, 2015.
Monwar et al., "A novel fuzzy multimodal information fusion technology for human biometric traits identification," IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11), https://ieexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6016128, 2011.
Pal et al., "A Better Matching Accuracy for Verification and Identification Using Biometric Features," 2012 Third International Conference on Computer and Communication Technology, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber-6394698, 2012.
Ribaric et al., "Experimental Evaluation of Matching-Score Normalization Techniques on Different Multimodal Biometric Systems," IEEE Mediterranean Electrotechnical Conference, https://ieeexplore.ieee.og/stamp/stamp.jsp?tp=&arnumber-1653147, 2006.
Tekade, Priyanka; Shende, Pritti. Enhancement of Security through Fused Multimodal Biometric System. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=8463928 (Year: 2017). *
Tong et al., "Improving Biometric Identification Through Quality-based Face and Fingerprint Biometric Fusion," IEEE Computer Society Conference on Computer Vision and Pattern Recognition—Workshops, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5543233, 2010.
Tong, Yan et al. Improving biometric identification through quality-based face and fingerprint biometric fusion. 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition—Workshops, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=5543233 (Year: 2010). *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210357487A1 (en) * 2020-05-13 2021-11-18 Alclear, Llc Modular biometric station with cohesive form factor
US11868456B2 (en) * 2020-05-13 2024-01-09 Secure Identity, Llc Modular biometric station with cohesive form factor

Also Published As

Publication number Publication date
US10938809B2 (en) 2021-03-02
US20240275781A1 (en) 2024-08-15
US11716330B2 (en) 2023-08-01
US20210226948A1 (en) 2021-07-22
US11997087B2 (en) 2024-05-28
US10523671B1 (en) 2019-12-31
US20230046836A1 (en) 2023-02-16
US20210144137A1 (en) 2021-05-13
US20200322328A1 (en) 2020-10-08
US11503021B2 (en) 2022-11-15
US20230403271A1 (en) 2023-12-14

Similar Documents

Publication Publication Date Title
US10777030B2 (en) Conditional and situational biometric authentication and enrollment
US11496471B2 (en) Mobile enrollment using a known biometric
US11900746B2 (en) System and method for providing credential activation layered security
US10810816B1 (en) Information-based, biometric, asynchronous access control system
KR102038851B1 (en) Method and system for verifying identities
US7725732B1 (en) Object authentication system
JP3356144B2 (en) User authentication device using biometrics and user authentication method used therefor
US20210327187A1 (en) Medical screening entry
US12019728B2 (en) AdHoc enrollment process
US20220253514A1 (en) Method and system for seamless biometric system self-enrollment
CN115758398A (en) Access control data processing method and device, access control system and storage medium
US12118843B2 (en) Providing digital identifications generated for checkpoint validation based on biometric identification
US20150100493A1 (en) EyeWatch credit card fraud prevention system
US11823512B1 (en) Smart access control system using an electronic card
JP2011118561A (en) Personal identification device and personal identification method
US20240005719A1 (en) Distributed biometric identity system enrollment with live confirmation
JP2006350683A (en) Personal authentication device

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: SECURE IDENTITY, LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCLEAR, LLC;REEL/FRAME:066131/0971

Effective date: 20221018